Lynx -vulnerabilities- is this permanent?

Jeffrey Goldberg jeffrey at goldmark.org
Thu Apr 19 02:09:37 UTC 2007


On Apr 18, 2007, at 1:42 PM, [LoN]Kamikaze wrote:

> David Southwell wrote:
>> Hi
>>
>> portupgrade -a produces following output for lynx on cvsup from  
>> today.
>> freebsd 6.1
>> -----------------------------------------
>> --->  Upgrading 'lynx-2.8.5_2' to 'lynx-2.8.6_4' (www/lynx)
>> --->  Building '/usr/ports/www/lynx'
>> ===>  Cleaning for lynx-2.8.6_4
>> ===>  lynx-2.8.6_4 has known vulnerabilities:
>> => lynx -- remote buffer overflow.
>>    Reference:
>> <http://www.FreeBSD.org/ports/portaudit/c01170bf-4990-11da- 
>> a1b8-000854d03344.html>
>> => Please update your ports tree and try again.
>> *** Error code 1
>>
>> Stop in /usr/ports/www/lynx.
>>
>> Any news or advice forthcoming?
>>
>> david
>
> Did you try a 'portaudit -F'?

I'm having the same problem as David, though I'm on 6.2.  Running

   portaudit -F

made no difference for  me.

-j

-- 
Jeffrey Goldberg                        http://www.goldmark.org/jeff/



More information about the freebsd-ports mailing list